1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
RSB [31]
3 years ago
6

PLEASE HELP!!!!

Computers and Technology
2 answers:
Crank3 years ago
8 0

Answer:

C. ASCII

Explanation:

ASCII is the abbreviation for American Standard Code for Information Interchange. It is a system of representing characters using 8-bits. The 8th bit is actually a parity bit used for parity check which is a form of error-checking. Since the parity check uses up one bit, only 7 bits are available for characters representation. Therefore, ASCII typically represents only 128 characters (calculated from 2 ^ 7 = 128). For example the ASCII code for the lower case letter b is 98 and that of upper case letter A is 65.

<em>Hope this helps!</em>

Elenna [48]3 years ago
7 0
C - ASCII (It is an encoding standard for text)
You might be interested in
What does a computer monitor look like when struck really hard?
sveticcg [70]

Answer:

physical damage could include broken glass or ink splotches on the display, distorted images, or discoloration

5 0
2 years ago
Are there different types of machine language?
7nadin3 [17]
No machine language have no any type
7 0
4 years ago
Read 2 more answers
Write a short note on "History of WWW" (word limit = 100-150 words)​
mihalych1998 [28]

Explanation:

it looks like there aren't many great matches for your search

Tip Try using words that might appear on the page that you’re looking for. For example, 'cake recipes' instead of 'how to make a cake'.

I hope you help

4 0
2 years ago
Read 2 more answers
A(n) ____ is a secure, private path across a public network that is set up to allow authorized users private, secure access to t
yKpoI14uk [10]
It's VPN(Virtual Private Network). It allows company to have private network at the same time secure. While others are not that secure.
4 0
3 years ago
If someone you knew was considering installing Smarthome technology, would you advise that person to install it or not? How woul
jeka94
Is this helpful? I would research extensively

5 0
4 years ago
Other questions:
  • Use blank to prevent friends who have been drinking from driving
    14·2 answers
  • List and describe four communication tools that are currently popular.
    9·1 answer
  • Two-factor authentication can best be breached by the adversary using:________. a. social engineering attack b. using sniffers l
    10·1 answer
  • A chemistry teacher colleague of yours uses video regularly in their courses, but commented to you about how much time it takes
    15·2 answers
  • I just downloaded this song and if any one wants to listen to it then go ahead and do that. It’s called Trap Music 2018 âa bass
    15·2 answers
  • You are having a problem with your Windows computer that is isolated to a single graphics editing program that you use every day
    12·1 answer
  • A variable is assigned a value on line 328 of a program. Which of the following must be true in order for the variable to work?
    12·2 answers
  • Select the correct answer from each drop-down menu. The following diagram shows four resistors. What is the effective resistance
    9·1 answer
  • Write a q basic program to find the sum of all the even numbers from 1 to 50​
    14·1 answer
  • A cell's address, its position in the workbook, is referred to as a ________________ when it is used in a formula.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!